Skip to content

Commit fdad98b

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-landing-azure-netapp-files
2 parents 474780e + 354023f commit fdad98b

File tree

165 files changed

+2275
-1773
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

165 files changed

+2275
-1773
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16880,6 +16880,11 @@
1688016880
"redirect_url": "/azure/storage/blobs/data-lake-storage-upgrade",
1688116881
"redirect_document_id": false
1688216882
},
16883+
{
16884+
"source_path": "articles/storage/blobs/data-lake-storage-upgrade.md",
16885+
"redirect_url": "/azure/storage/blobs/data-lake-storage-migrate-gen1-to-gen2",
16886+
"redirect_document_id": false
16887+
},
1688316888
{
1688416889
"source_path": "articles/storage/blobs/data-lake-storage-integrate-with-azure-services.md",
1688516890
"redirect_url": "/azure/storage/blobs/data-lake-storage-supported-azure-services",

articles/active-directory-b2c/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -182,9 +182,13 @@
182182
- name: Customize the UI
183183
href: custom-policy-ui-customization.md
184184
displayName: ux, input, cors, html, css
185+
- name: Customize language
186+
href: custom-policy-localization.md
185187
- name: Custom email
186188
href: custom-email.md
187189
displayName: verification
190+
- name: Disable email verification
191+
href: custom-policy-disable-email-verification.md
188192
- name: Enable JavaScript
189193
href: javascript-samples.md
190194
- name: Password complexity

articles/active-directory-b2c/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ During the implementation phase, consider the following recommendations.
4747

4848
| | |
4949
|--|--|
50-
| Edit custom policies with the Azure AD B2C extension for Visual Studio Code | Download Visual Studio Code and this community-built [extension from the Visual Studio Code Marketplace]((https://marketplace.visualstudio.com/items?itemName=AzureADB2CTools.aadb2c)). While not an official Microsoft product, the Azure AD B2C extension for Visual Studio Code includes several features that help make working with custom policies easier. |
50+
| Edit custom policies with the Azure AD B2C extension for Visual Studio Code | Download Visual Studio Code and this community-built [extension from the Visual Studio Code Marketplace](https://marketplace.visualstudio.com/items?itemName=AzureADB2CTools.aadb2c). While not an official Microsoft product, the Azure AD B2C extension for Visual Studio Code includes several features that help make working with custom policies easier. |
5151
| Learn how to troubleshoot Azure AD B2C | Learn how to [troubleshoot custom policies](https://docs.microsoft.com/azure/active-directory-b2c/troubleshoot-custom-policies?tabs=applications) during development. Learn what a normal authentication flow looks like and use tools for discovering anomalies and errors. For example, use [Application Insights](troubleshoot-with-application-insights.md) to review output logs of user journeys. |
5252
| Leverage our library of proven custom policy patterns | Find [samples](https://github.com/azure-ad-b2c/samples) for several enhanced Azure AD B2C customer identity and access management (CIAM) user journeys. |
5353

Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
---
2+
title: Disable email verification during customer sign-up with a custom policy
3+
titleSuffix: Azure AD B2C
4+
description: Learn how to disable email verification during customer sign-up in Azure Active Directory B2C.
5+
services: active-directory-b2c
6+
author: msmimart
7+
manager: celestedg
8+
9+
ms.service: active-directory
10+
ms.workload: identity
11+
ms.topic: conceptual
12+
ms.date: 03/11/2020
13+
ms.author: mimart
14+
ms.subservice: B2C
15+
---
16+
17+
# Disable email verification during customer sign-up using a custom policy in Azure Active Directory B2C
18+
19+
[!INCLUDE [disable email verification intro](../../includes/active-directory-b2c-disable-email-verification.md)]
20+
21+
## Prerequisites
22+
23+
Complete the steps in [Get started with custom policies](custom-policy-get-started.md). You should have a working custom policy for sign-up and sign-in with social and local accounts.
24+
25+
## Add the metadata to the self-asserted technical profile
26+
27+
The **LocalAccountSignUpWithLogonEmail** technical profile is a [self-asserted](self-asserted-technical-profile.md), which is invoked during the sign-up flow. To disable the email verification, set the `EnforceEmailVerification` metadata to false. Override the LocalAccountSignUpWithLogonEmail technical profiles in the extension file. Find the `ClaimsProviders` element. Add the following claims provider to the `ClaimsProviders` element:
28+
29+
30+
```XML
31+
<ClaimsProvider>
32+
<DisplayName>Local Account</DisplayName>
33+
<TechnicalProfiles>
34+
<TechnicalProfile Id="SelfAsserted-LocalAccountSignin-Email">
35+
<Metadata>
36+
<Item Key="EnforceEmailVerification">false</Item>
37+
</Metadata>
38+
</TechnicalProfile>
39+
</TechnicalProfiles>
40+
</ClaimsProvider>
41+
```
42+
43+
## Test the custom policy
44+
45+
1. Sign in to the [Azure portal](https://portal.azure.com).
46+
2. Make sure you're using the directory that contains your Azure AD tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your Azure AD tenant.
47+
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
48+
4. Select **Identity Experience Framework**.
49+
5. Select **Upload Custom Policy**, and then upload the two policy files that you changed.
50+
2. Select the sign-up or sign-in policy that you uploaded, and click the **Run now** button.
51+
3. You should be able to sign up using an email address without the validation.
52+
53+
54+
## Next steps
55+
56+
- Learn more about the [self-asserted technical profile](self-asserted-technical-profile.md) in the IEF reference.

0 commit comments

Comments
 (0)